您的位置: 专家智库 > >

霍英东教育基金(131067)

作品数:15 被引量:21H指数:3
发文基金:霍英东教育基金国家自然科学基金国家教育部博士点基金更多>>
相关领域:理学电子电信自动化与计算机技术自然科学总论更多>>

文献类型

  • 12篇中文期刊文章

领域

  • 8篇理学
  • 5篇电子电信
  • 2篇自动化与计算...
  • 1篇机械工程
  • 1篇交通运输工程

主题

  • 4篇量子
  • 3篇PROTOC...
  • 3篇QUANTU...
  • 2篇通信
  • 2篇纠缠
  • 2篇BASED_...
  • 2篇BELL态
  • 2篇ENTANG...
  • 2篇GHZ
  • 2篇STEGAN...
  • 1篇信息隐藏
  • 1篇旋转噪声
  • 1篇噪声
  • 1篇张量积
  • 1篇直接通信
  • 1篇容错
  • 1篇签名
  • 1篇签名协议
  • 1篇子空间
  • 1篇幺正变换

传媒

  • 4篇Comput...
  • 3篇Chines...
  • 3篇Scienc...
  • 2篇Journa...

年份

  • 1篇2021
  • 3篇2020
  • 2篇2019
  • 2篇2015
  • 1篇2014
  • 3篇2013
15 条 记 录,以下是 1-10
排序方式:
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK
2020年
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitably brings the issues with respect to data privacy and operating performance.In this paper,we proposed a novel blockchain scheme called Cipherchain,which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed.Specifically in our scheme,transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search(mPECK),and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger.By introducing execution-consensus-update paradigm of transaction flow,Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext,but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work.In addition,Cipherchain is a promising scheme to realize the technology combination of“blockchain+cloud computing”and“permissioned blockchain+public blockchain”.
Hailin ChenGang XuYuling ChenXiubo ChenYixian YangRuibin FanKaixiang ZhangHuizhong Li
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
2013年
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information.Recently,El Allati et al.proposed a new quantum steganography using the GHZ4 state.Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered,we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations.To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state,we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states.Due to the symmetry of the GHZ4 state,all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states,so the improved protocol achieves a high efficiency.
徐淑奖陈秀波钮心忻杨义先
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States被引量:1
2019年
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view.
Gang XuKe XiaoZongpeng LiXin-Xin NiuMichael Ryan
Typical universal entanglers
2014年
A universal entangler is a very powerful fault-tolerant entangling device for generating quantum entanglements from any joint states. Our paper aims to address the construction of universal entanglers. We prove that universal entanglers may be obtained from random unitary gates according to the Harr measure. The success probability is close to 1 for large system spaces. This result represents the typical density of entanglement subspaces in large state spaces. It also partially solves an open problem of universal bipartite entanglers and is explained by some experiment simulations.
WANG FengLUO MingXingCHEN XiuBoYANG YiXianWANG XiaoJun
关键词:量子纠缠子空间
A blind quantum signature protocol using the GHZ states被引量:10
2013年
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others.
WANG MingMingCHEN XiuBoYANG YiXian
关键词:签名协议GHZ态安全保证GHZ
Directional Modulation Based on a Quantum Genetic Algorithm for a Multiple-Reflection Model
2020年
Directional modulation is one of the hot topics in data security researches.To fulfill the requirements of communication security in wireless environment with multiple paths,this study takes into account the factors of reflections and antenna radiation pattern for directional modulation.Unlike other previous works,a novel multiple-reflection model,which is more realistic and complex than simplified two-ray reflection models,is proposed based on two reflectors.Another focus is a quantum genetic algorithm applied to optimize antenna excitation in a phased directional modulation antenna array.The quantum approach has strengths in convergence speed and the globe searching ability for the complicated model with the large-size antenna array and multiple paths.From this,a phased directional modulation transmission system can be optimized as regards communication safety and improve performance based on the constraint of the pattern of the antenna array.Our work can spur applications of the quantum evolutionary algorithm in directional modulation technology,which is also studied.
Yuwei HuangXiubo ChenKaiguo YuanJianyi ZhangBiao Liu
Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise被引量:1
2015年
This study proposes two novel fault tolerant deterministic secure quantum communication(DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications.Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel.
王朝刘建伟陈秀波毕亚港尚涛
关键词:量子通信旋转噪声容错相位噪声
A Position Self-Adaptive Method to Detect Fake Access Points
2020年
In recent years,with the maturity and popularity of Wi-Fi technology,wireless hotspots have been deployed on a large scale in public places.But at the same time,it brings many security issues that cannot be ignored.Among them,the fake access point attack is a very serious threat in wireless local area network.In this paper,we propose a method to detect fake access points in wireless local area network.First,our detection method is passive,which means there is almost no additional traffic will be generated during the program’s operation.Second,different from many existing methods,our method allows the detection device to change position,the move will be perceived and the fingerprint will be updated automatically.Third,we use a variety of features as fingerprints to describe an access point better and improve efficiency.At last,the method we propose is more in line with the actual scene and has been proved effective by experiments.
Ping Lu
A Practical Quantum Network Coding Protocol Based on Non-Maximally Entangled State
2021年
In many earlier works,perfect quantum state transmission over the butterfly network can be achieved via quantum network coding protocols with the assist of maximally entangled states.However,in actual quantum networks,a maximally entangled state as auxiliary resource is hard to be obtained or easily turned into a non-maximally entangled state subject to all kinds of environmental noises.Therefore,we propose a more practical quantum network coding scheme with the assist of non-maximally entangled states.In this paper,a practical quantum network coding protocol over grail network is proposed,in which the non-maximally entangled resource is assisted and even the desired quantum state can be perfectly transmitted.The achievable rate region,security and practicability of the proposed protocol are discussed and analyzed.This practical quantum network coding protocol proposed over the grail network can be regarded as a useful attempt to help move the theory of quantum network coding towards practicability.
Zhen-Zhen LiZi-Chen LiXiu-Bo ChenZhiguo QuXiaojun WangHaizhu Pan
High-efficiency quantum steganography based on the tensor product of Bell states被引量:6
2013年
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
XU ShuJiangCHEN XiuBoNIU XinXinYANG YiXian
关键词:BELL态张量积量子安全直接通信幺正变换拒绝服务攻击
共2页<12>
聚类工具0